The document analyzes the 2011 hack of RSA Security and subsequent breach of Lockheed Martin's network. It describes how hackers were able to gain access to RSA through a phishing email containing a zero-day Flash exploit. This allowed them to steal RSA's SecurID token secrets and user data. Months later, the same hackers were able to access Lockheed Martin's network using stolen SecurID credentials. The document outlines the attack methods used at each company and lessons learned, including Lockheed Martin's implementation of an internal cyber defense system called the Cyber Kill Chain to prevent future data exfiltration.